Using Information in Access Logs for Large Scale Identity Linkage

被引:0
|
作者
Jalali, Leila [1 ]
Kim, Sungchul [2 ]
Krishnamoorthy, Narayanan [1 ]
Biswas, Rahul [1 ]
机构
[1] Adobe Inc, San Jose, CA 95110 USA
[2] Adobe Res, San Jose, CA USA
关键词
Identity Linkage; Online Data; Access Logs; Big Data; Scalability;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the world becoming more connected than ever and the growth of the number of connected devices, each individual user accesses services from a range of devices, including personal desktops and laptop computers, tablets, mobile devices, vehicles, and entertainment systems. One fundamental problem is to identify the user using the fragmentation of identity and consumer profiles across these connected devices. In this paper, we discuss Adobe's Identity Graph that provides a comprehensive solution to the challenge posed by fragmentation of identities. In particular, we propose an approach to use all the features in the logs using both online data traffic and offline data logs. We use probability based correlation methods to link identities across different devices with high accuracy. We validate the effectiveness of our proposed approach with massive large data covering more than 1.9 billion connected devices resulting in more than 200 million user identities. Our evaluation results show that using information in access logs can be effective in linking identities and achieving a practical and scalable solution.
引用
下载
收藏
页码:2906 / 2911
页数:6
相关论文
共 50 条
  • [1] Query recommendation using large-scale web access logs and web page archive
    Li, Lin
    Otsuka, Shingo
    Kitsuregawa, Masaru
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2008, 5181 : 134 - +
  • [2] Learning to Cluster Documents into Workspaces Using Large Scale Activity Logs
    Kong, Weize
    Bendersky, Michael
    Najork, Marc
    Vargo, Brandon
    Colagrosso, Mike
    KDD '20: PROCEEDINGS OF THE 26TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2020, : 2416 - 2424
  • [3] Detecting Insider Information Theft Using Features from File Access Logs
    Gates, Christopher
    Li, Ninghui
    Xu, Zenglin
    Chari, Suresh N.
    Molloy, Ian
    Park, Youngja
    COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 383 - 400
  • [4] INFORMATION-STORAGE AND RETRIEVAL USING A LARGE-SCALE RANDOM-ACCESS MEMORY
    NOLAN, JJ
    AMERICAN DOCUMENTATION, 1959, 10 (01): : 27 - 35
  • [5] HYDRA: Large-scale Social Identity Linkage via Heterogeneous Behavior Modeling
    Liu, Siyuan
    Wang, Shuhui
    Zhu, Feida
    Zhang, Jinbo
    Krishnan, Ramayya
    SIGMOD'14: PROCEEDINGS OF THE 2014 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2014, : 51 - 62
  • [6] Characterizing Email Search using Large-scale Behavioral Logs and Surveys
    Ai, Qingyao
    Dumais, Susan T.
    Craswell, Nick
    Liebling, Dan
    PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'17), 2017, : 1511 - 1520
  • [7] Mobile Access Record Resolution on Large-Scale Identifier-Linkage Graphs
    Shen Xin
    Yang, Hongxia
    Xian, Weizhao
    Ester, Martin
    Bu, Jiajun
    Wang, Zhongyao
    Wang, Can
    KDD'18: PROCEEDINGS OF THE 24TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2018, : 886 - 894
  • [8] The collection and integrated access to network performance information in a large scale client/server environment using SAS
    MacFarland, T
    Bechtold, G
    PROCEEDINGS OF THE TWENTY-SECOND ANNUAL SAS USERS GROUP INTERNATIONAL CONFERENCE, 1997, : 1431 - 1436
  • [9] Large-Scale Distributed Linkage of Records Containing Spatio-Temporal Information
    Karapiperis, Dimitrios
    Gkoulalas-Divanis, Aris
    Verykios, Vassilios S.
    2020 IEEE INTERNATIONAL SMART CITIES CONFERENCE (ISC2), 2020,
  • [10] "Life Portal": An Information Access Scheme Based on Life Logs
    Eitoku, Shin-ichiro
    Motegi, Manabu
    Mochizuki, Rika
    Yagi, Takashi
    Muto, Shin-yo
    Abe, Masanobu
    HUMAN INTERFACE AND THE MANAGEMENT OF INFORMATION: INTERACTING WITH INFORMATION, PT 2, 2011, 6772 : 11 - 20